Amazon Linux 2023 Security Advisory: ALAS2023-2025-1225
Advisory Released Date: 2025-10-14
Advisory Updated Date: 2025-10-14
Issue summary: An application trying to decrypt CMS messages encrypted using
password based encryption can trigger an out-of-bounds read and write.
Impact summary: This out-of-bounds read may trigger a crash which leads to
Denial of Service for an application. The out-of-bounds write can cause
a memory corruption which can have various consequences including
a Denial of Service or Execution of attacker-supplied code.
Although the consequences of a successful exploit of this vulnerability
could be severe, the probability that the attacker would be able to
perform it is low. Besides, password based (PWRI) encryption support in CMS
messages is very rarely used. For that reason the issue was assessed as
Moderate severity according to our Security Policy.
The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this
issue, as the CMS implementation is outside the OpenSSL FIPS module
boundary. (CVE-2025-9230)
Issue summary: A timing side-channel which could potentially allow remote
recovery of the private key exists in the SM2 algorithm implementation on 64 bit
ARM platforms.
Impact summary: A timing side-channel in SM2 signature computations on 64 bit
ARM platforms could allow recovering the private key by an attacker..
While remote key recovery over a network was not attempted by the reporter,
timing measurements revealed a timing signal which may allow such an attack.
OpenSSL does not directly support certificates with SM2 keys in TLS, and so
this CVE is not relevant in most TLS contexts. However, given that it is
possible to add support for such certificates via a custom provider, coupled
with the fact that in such a custom provider context the private key may be
recoverable via remote timing measurements, we consider this to be a Moderate
severity issue.
The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this
issue, as SM2 is not an approved algorithm. (CVE-2025-9231)
Affected Packages:
openssl
Issue Correction:
Run dnf update openssl --releasever 2023.9.20251014 or dnf update --advisory ALAS2023-2025-1225 --releasever 2023.9.20251014 to update your system.
More information on how to update your system can be found on this page: Amazon Linux 2023 documentation
aarch64:
openssl-snapsafe-libs-debuginfo-3.2.2-1.amzn2023.0.2.aarch64
openssl-perl-3.2.2-1.amzn2023.0.2.aarch64
openssl-fips-provider-latest-debuginfo-3.2.2-1.amzn2023.0.2.aarch64
openssl-libs-debuginfo-3.2.2-1.amzn2023.0.2.aarch64
openssl-debuginfo-3.2.2-1.amzn2023.0.2.aarch64
openssl-fips-provider-latest-3.2.2-1.amzn2023.0.2.aarch64
openssl-libs-3.2.2-1.amzn2023.0.2.aarch64
openssl-snapsafe-libs-3.2.2-1.amzn2023.0.2.aarch64
openssl-3.2.2-1.amzn2023.0.2.aarch64
openssl-debugsource-3.2.2-1.amzn2023.0.2.aarch64
openssl-devel-3.2.2-1.amzn2023.0.2.aarch64
src:
openssl-3.2.2-1.amzn2023.0.2.src
x86_64:
openssl-snapsafe-libs-debuginfo-3.2.2-1.amzn2023.0.2.x86_64
openssl-debuginfo-3.2.2-1.amzn2023.0.2.x86_64
openssl-libs-debuginfo-3.2.2-1.amzn2023.0.2.x86_64
openssl-snapsafe-libs-3.2.2-1.amzn2023.0.2.x86_64
openssl-fips-provider-latest-debuginfo-3.2.2-1.amzn2023.0.2.x86_64
openssl-perl-3.2.2-1.amzn2023.0.2.x86_64
openssl-libs-3.2.2-1.amzn2023.0.2.x86_64
openssl-fips-provider-latest-3.2.2-1.amzn2023.0.2.x86_64
openssl-3.2.2-1.amzn2023.0.2.x86_64
openssl-debugsource-3.2.2-1.amzn2023.0.2.x86_64
openssl-devel-3.2.2-1.amzn2023.0.2.x86_64